Research Article
A New Approach to Mitigate Jamming Attack in Wireless Adhoc Network Using ARC Technique
@INPROCEEDINGS{10.1007/978-3-319-73712-6_20, author={Naren Tada and Tejas Patalia and Pinal Rupani}, title={A New Approach to Mitigate Jamming Attack in Wireless Adhoc Network Using ARC Technique}, proceedings={Future Internet Technologies and Trends. First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings}, proceedings_a={ICFITT}, year={2018}, month={2}, keywords={MANET Jamming attack NS-3 jamming module Coordinated channel switching ARC (Anti-Reactive Control) Technique}, doi={10.1007/978-3-319-73712-6_20} }
- Naren Tada
Tejas Patalia
Pinal Rupani
Year: 2018
A New Approach to Mitigate Jamming Attack in Wireless Adhoc Network Using ARC Technique
ICFITT
Springer
DOI: 10.1007/978-3-319-73712-6_20
Abstract
Wireless Adhoc Network is a set of wireless nodes that dynamically self-organizing into a changeable topology to design the network using any preceding framework. Two possibilities are there to communicate nodes; either node can communicate directly or by forwarding network traffic through intermediate nodes in wireless adhoc network. Various types of attacks can undoubtedly be accomplished by an opponent either by passing MAC layer protocol or sending Radio Signals. Reviewing the role of wireless adversary, which victims the packets of high importance and do not follow network architecture. Attacker will make possible efforts of making users not to use network resources and fail the communication. The authors believe that detecting Jamming Attack using Reactive Jammers is quite difficult. Our Proposed approach about Global Detection of Jamming is helpful in securing other nodes from Jammer’s Activity by broadcasting Jammer’s UID. For mitigation, our approach named ARC (Anti-Reactive Control) Technique which shows that Jamming Attack against Reactive Jammer can be detected using decreasing PDR and RSS values and successfully mitigated by executing channel hopping. Using NS3 simulation, the attack can be identified through the decreased in performance criteria and successfully mitigated by executing channel hopping. We have analyzed the result using NS3 Wireless Jamming Module.